{"title":"基于新型二维逻辑正弦耦合混沌图和位级动态加扰的图像加密算法","authors":"Jie Fang, Kaihui Zhao, Shixiao Liang, Jiabin Wang","doi":"10.1002/cpe.8261","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>This paper develops a new image encryption algorithm based on a novel two-dimensional chaotic map and bit-level dynamic scrambling. First, multiple one-dimensional chaotic maps are coupled to construct a novel two dimensions Logistic-Sine-coupling chaos map (2D-LSCCM). The performance analysis shows that the 2D-LSCCM has more complex chaotic characteristics and wider chaotic range than many extant 2D chaos maps. Second, original image matrix combines with hash algorithm SHA-256 to generate a hash value. The initial values of 2D-LSCCM are generated based on the hash value. Third, the original image matrix is divided into multiple sub-matrices by wavelet transform, followed by scrambling by an improved Knuth shuffle algorithm. Fourth, the scrambled multiple sub-matrices are stitched into an image matrix of <span></span><math>\n <semantics>\n <mrow>\n <mi>M</mi>\n <mo>×</mo>\n <mi>N</mi>\n <mo>×</mo>\n <mn>3</mn>\n </mrow>\n <annotation>$$ M\\times N\\times 3 $$</annotation>\n </semantics></math> and converted into a binary matrix. The chaotic sequence generated by 2D-LSCCM is introduced as a control sequence to control the bit-level scrambling of pixel points, which realizes the bit-level dynamic scrambling. Finally, the diffusion operation is performed by parameter <i>par</i> and chaotic sequence to obtain the final encrypted image. The algorithm security analysis and simulation examples demonstrate the effectiveness of the proposed encryption scheme.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 25","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Image encryption algorithm based on a novel 2D logistic-sine-coupling chaos map and bit-level dynamic scrambling\",\"authors\":\"Jie Fang, Kaihui Zhao, Shixiao Liang, Jiabin Wang\",\"doi\":\"10.1002/cpe.8261\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>This paper develops a new image encryption algorithm based on a novel two-dimensional chaotic map and bit-level dynamic scrambling. First, multiple one-dimensional chaotic maps are coupled to construct a novel two dimensions Logistic-Sine-coupling chaos map (2D-LSCCM). The performance analysis shows that the 2D-LSCCM has more complex chaotic characteristics and wider chaotic range than many extant 2D chaos maps. Second, original image matrix combines with hash algorithm SHA-256 to generate a hash value. The initial values of 2D-LSCCM are generated based on the hash value. Third, the original image matrix is divided into multiple sub-matrices by wavelet transform, followed by scrambling by an improved Knuth shuffle algorithm. Fourth, the scrambled multiple sub-matrices are stitched into an image matrix of <span></span><math>\\n <semantics>\\n <mrow>\\n <mi>M</mi>\\n <mo>×</mo>\\n <mi>N</mi>\\n <mo>×</mo>\\n <mn>3</mn>\\n </mrow>\\n <annotation>$$ M\\\\times N\\\\times 3 $$</annotation>\\n </semantics></math> and converted into a binary matrix. The chaotic sequence generated by 2D-LSCCM is introduced as a control sequence to control the bit-level scrambling of pixel points, which realizes the bit-level dynamic scrambling. Finally, the diffusion operation is performed by parameter <i>par</i> and chaotic sequence to obtain the final encrypted image. The algorithm security analysis and simulation examples demonstrate the effectiveness of the proposed encryption scheme.</p>\\n </div>\",\"PeriodicalId\":55214,\"journal\":{\"name\":\"Concurrency and Computation-Practice & Experience\",\"volume\":\"36 25\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2024-08-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation-Practice & Experience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8261\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8261","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Image encryption algorithm based on a novel 2D logistic-sine-coupling chaos map and bit-level dynamic scrambling
This paper develops a new image encryption algorithm based on a novel two-dimensional chaotic map and bit-level dynamic scrambling. First, multiple one-dimensional chaotic maps are coupled to construct a novel two dimensions Logistic-Sine-coupling chaos map (2D-LSCCM). The performance analysis shows that the 2D-LSCCM has more complex chaotic characteristics and wider chaotic range than many extant 2D chaos maps. Second, original image matrix combines with hash algorithm SHA-256 to generate a hash value. The initial values of 2D-LSCCM are generated based on the hash value. Third, the original image matrix is divided into multiple sub-matrices by wavelet transform, followed by scrambling by an improved Knuth shuffle algorithm. Fourth, the scrambled multiple sub-matrices are stitched into an image matrix of and converted into a binary matrix. The chaotic sequence generated by 2D-LSCCM is introduced as a control sequence to control the bit-level scrambling of pixel points, which realizes the bit-level dynamic scrambling. Finally, the diffusion operation is performed by parameter par and chaotic sequence to obtain the final encrypted image. The algorithm security analysis and simulation examples demonstrate the effectiveness of the proposed encryption scheme.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.